SlideShare a Scribd company logo
1 of 16
Download to read offline
7/12/2013
1
HOW TECHNOLOGY CONTINUES
TO REVOLUTIONIZE AUDITING:
THE LATEST TOOLS AND THEIR
IMPACT ON THE PROFESSION
JIM KAPLAN CIA CFE
PRESIDENT AND FOUNDER
AUDITNET®
AHIA 31st Annual Conference – August 26-29, 2012 – Philadelphia PA
www.ahia.org
1
Agenda
 Introduction
 Historical Timeline Internet and Auditors
 Technology’s Impact on Audit
 Innovation in Audit Research
 Evolution of Professional Networking
 Latest Technology Tools for Auditors
 Trends and the Future of Audit Technology
7/12/2013
2
Then and Now
Auditors and Technology
 Early Adopters
 Innovators (into the new
from Latin
 Interested in new
methods & techniques
 Risk takers
 Forward thinking
 Gen X & Y
 Laggards
 Wait and see
 Cautious
 Hangs back
 Last group to try or
adopt a new product
 Dislike change
7/12/2013
3
Evolution of Web for Audit
Computers, Auditors and CAATTs
 The Evolution of CAATTs 80’s
 Around
 Through
 With
 EDP/IT Auditors
 Mainframe
 Audit Software 90’s
 Data extraction and analysis
 IT and non IT Auditors
 Windows
 The Millenium
 Software for all phases (planning, fieldwork, GRC)
 Cloud computing
7/12/2013
4
Impact of Technology
 Computers and networks provide most of the
information needed for auditing
 Auditors must use the computer as an auditing
tool
 Auditors must also use the computer for audit
administration
Impact of New Technology on the
Profession
 Professional Standards
 16 Global Technology Audit Guides have been
released since January 2009
7/12/2013
5
New Technologies and their Impact
 Mobile computing
 The Cloud or Internet based services
 SaaS (application based)
 PaaS (end to end SDLC)
 IaaS (servers, storage, network)
Social Media
 Social Media Defined
 The good the bad
and the ugly
 What is the primary
risk?
7/12/2013
6
Technology as an Enabler
There is a wide array of specialized tools to
support and enhance the entire spectrum of
internal audit processes … for the most part
(auditors) are not taking advantage of them
Not surprisingly, survey participants predict that
technology will affect internal audit roles and
responsibilities more than any other business
trend.
PwC 2010 Study on the State of the internal audit profession
Audit Software
7/12/2013
7
Categories of Audit Software Technology
Automated
Issues
Tracking
Electronic
Work Papers
Risk
Assessment
Continuous
Controls
Monitoring
Anti Fraud
Software
GRC
Audit
Management
Software
Audit
Resource
Scheduling
Data
Analytics
Data Analysis for Auditors
Although internal auditors have been doing data analysis for
more than 25 years, it has only recently started to become
standard practice.
By our nature, most accountants and auditors are inclined to
stick with what has worked in the past, rather than reach
outside our comfort zone for an alternative that could help
us accomplish more.
Do you reach outside your comfort zone?
7/12/2013
8
Obstacles to Implementation
 Lack of an audit methodology
 Skill set gap
 Department size
 Cost implication
 Complexity of the software
 Resistance in training auditors
 Failure of software to meet audit departments needs
 Failure to plan for use
Heard on the Street
Technology Initiatives considered having the most
impact (2012 AICPA Top Technology Issues)
1.Information security
2.Remote access
3.Control and use of mobile devices
4.Business process improvement with technology
5.Data retention policies and structure
6.Privacy policies and compliance
7.Staff and management training
8.Spreadsheet management
9.Overall data proliferation and control
10.Portals (vendor and client/customer)
7/12/2013
9
New Tools for Auditors
New Tools
 Sept, 2008….
 Any device, Any time, Any
where was born
 Users not interested in
security, they want to trust,
not to be trusted
 Any unprotected device
connected to both the
Internet & and company
LAN poses a security risk
7/12/2013
10
Other Technology Tools for Auditors
 Open Source Audit Software
 Continuous Controls Monitoring
 Regulatory Compliance
 Business Intelligence Software
Audit Apps for iPhones/iPads
7/12/2013
11
Imagine the Possibilities
 Access your computer from remote locations
 Collaborate using tools from the road
 Access audit programs, work papers and more
from your mobile device
 Join Webinars and Webcasts for training
 Conduct or participate in virtual meetings with
staff, clients etc.
Trends and their Impact
 Mobile devices and wireless computing
 Smart devices and malware
 Cloud sourcing and computing – security, governance
and compliance
 Social media platform for communications
 Continuous risk and control assessment
 Reporting to the Board using SOTA technology
7/12/2013
12
Skill Set for Future Auditors
 Multi-disciplinary less accountants more
business oriented
 Critical thinking skills
 Strong communication skills
 Audit Technology oriented
The Impact of Technology Observations
Not surprisingly, survey participants predict that
technology will affect internal audit roles and
responsibilities more than any other business
trend.
High-performing internal audit functions maximize
the use of technology to enhance the efficiency,
effectiveness, and quality of operations.
PwC 2012 Study on the State of the internal audit profession
7/12/2013
13
AuditNet® Survey - 2012 State of Technology
Use by Auditors
Profile of Over 1,500 Responses
• 45% 5 or less auditors
• Technology tools used – mostly data analytics and
EWP
• Technology tools least used – monitoring (continuous
audit and fraud), GRC, risk compliance
• Only 17% feel that their auditors are technology
proficient
• Technology training primarily OJT
• 35% maintain an inventory of audit technology
tools
• More than half (54%) rated their department at the
informal use level (ad hoc or none at all) for audit
technology
• Less than 4% rated their department at the highest
maturity level
AuditNet® 10 Point Action Plan for Integrating
Technology in Audit
1. Conduct an inventory of audit technology tools
2. Provide training for all staff in use of audit
technology
3. Measure staff technology KSA
4. Build a business case for audit technology
5. Work with IT and Senior Management on cost
6. Hire auditors with technology skills
7. Find a technology champion and influencer
8. Establish an audit technology assessment
benchmark and update annually
9. Require the use of technology for all audit and
administrative tasks
10. Develop a succession plan so that audit software
does not become shelfware
7/12/2013
14
AHIA Improvement Needs Top 5
27
 Continuous Audit
 IT Audit Performance
 Data Analytics
 Enterprise Risk Management
 Clinical Processes
Future Predictions
 Standards will mandate use of technology tools for
audit
 New generation of auditors must have the KSA to
utilize technology
 If auditors and audit departments do not adapt to
new technology they risk outsourcing
 Social networking will evolve to professional
networking
 Tools will become more intuitive
 Knowledge hubs for audit tool, techniques and
resources will consolidate and merge
7/12/2013
15
Audit Programs in the Queue
AuditNet®
 Auditor’s Guide to Cloud Computing - Security
Considerations.xls
 Cloud Matrix_Benefits & Risks.xls
 AuditNet® Guide to Social Networking
 AuditNet® Guide to Wireless Security
 Business Continuity Planning – A Diagnostic Tool
 Forensic Document Examination
 Guidelines for Validation Testing
 Data Analytics Enabled Audit Programs for Key Business
Processes
 AuditNet® is working to provide tools and resources to
keep pace with new technology!
Conclusion
 I hope that I have provided you
with some useful information
that will stimulate your thought
processes!
 Any questions?
7/12/2013
16
Contact Information
Jim Kaplan CIA, CFE editor@auditnet.org
http://www.auditnet.org

More Related Content

What's hot

Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringLeveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringJim Kaplan CIA CFE
 
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Jim Kaplan CIA CFE
 
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & CultureInternal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & CultureJim Kaplan CIA CFE
 
2013 audit net guide to audit planning
2013 audit net guide to audit planning2013 audit net guide to audit planning
2013 audit net guide to audit planningJim Kaplan CIA CFE
 
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...Jim Kaplan CIA CFE
 
New Business Models in Behavioral Health IT
New Business Models in Behavioral Health ITNew Business Models in Behavioral Health IT
New Business Models in Behavioral Health ITHostway|HOSTING
 
IT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in HealthcareIT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in HealthcareCA Technologies
 
Apellis Pharmaceuticals Selects a Modern Safety Solution
Apellis Pharmaceuticals Selects a Modern Safety SolutionApellis Pharmaceuticals Selects a Modern Safety Solution
Apellis Pharmaceuticals Selects a Modern Safety SolutionVeeva Systems
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
 
Best Practices for Managing Regulatory Binders Electronically
Best Practices for Managing Regulatory Binders ElectronicallyBest Practices for Managing Regulatory Binders Electronically
Best Practices for Managing Regulatory Binders ElectronicallyVeeva Systems
 
IT Compliance in 2015 - Beyond the “v” model
IT Compliance in 2015 - Beyond the “v” modelIT Compliance in 2015 - Beyond the “v” model
IT Compliance in 2015 - Beyond the “v” modelIGATE Corporation
 
Using Vault eTMF Milestones and EDLs to Support Inspection Readiness
Using Vault eTMF Milestones and EDLs to Support Inspection ReadinessUsing Vault eTMF Milestones and EDLs to Support Inspection Readiness
Using Vault eTMF Milestones and EDLs to Support Inspection ReadinessVeeva Systems
 
Quality Management System Vendor Software System Use Benchmark March2014
Quality Management System Vendor Software System Use Benchmark March2014Quality Management System Vendor Software System Use Benchmark March2014
Quality Management System Vendor Software System Use Benchmark March2014Quality & Regulatory Network LLC
 
SolarWinds Application Performance End User Survey (Australia)
SolarWinds Application Performance End User Survey (Australia)SolarWinds Application Performance End User Survey (Australia)
SolarWinds Application Performance End User Survey (Australia)SolarWinds
 
Lexcomply - Compliance Management Solutions
Lexcomply - Compliance Management SolutionsLexcomply - Compliance Management Solutions
Lexcomply - Compliance Management SolutionsLexComply
 
Benefits of Software Asset Management
Benefits of Software Asset ManagementBenefits of Software Asset Management
Benefits of Software Asset ManagementIskandar Ahmat
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Oracle
 

What's hot (20)

Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringLeveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
 
It22015 slides
It22015 slidesIt22015 slides
It22015 slides
 
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...Importing Data - The Complete Course in All File Types and Data Tricks to Get...
Importing Data - The Complete Course in All File Types and Data Tricks to Get...
 
Internal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & CultureInternal Audit's Role in Ethics, Governance, & Culture
Internal Audit's Role in Ethics, Governance, & Culture
 
2013 audit net guide to audit planning
2013 audit net guide to audit planning2013 audit net guide to audit planning
2013 audit net guide to audit planning
 
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
Auditor’s Guide to Using Social Networking for Adding Value to Your Audit Fun...
 
New Business Models in Behavioral Health IT
New Business Models in Behavioral Health ITNew Business Models in Behavioral Health IT
New Business Models in Behavioral Health IT
 
IT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in HealthcareIT Infrastructure Monitoring Strategies in Healthcare
IT Infrastructure Monitoring Strategies in Healthcare
 
Apellis Pharmaceuticals Selects a Modern Safety Solution
Apellis Pharmaceuticals Selects a Modern Safety SolutionApellis Pharmaceuticals Selects a Modern Safety Solution
Apellis Pharmaceuticals Selects a Modern Safety Solution
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
Best Practices for Managing Regulatory Binders Electronically
Best Practices for Managing Regulatory Binders ElectronicallyBest Practices for Managing Regulatory Binders Electronically
Best Practices for Managing Regulatory Binders Electronically
 
IT Compliance in 2015 - Beyond the “v” model
IT Compliance in 2015 - Beyond the “v” modelIT Compliance in 2015 - Beyond the “v” model
IT Compliance in 2015 - Beyond the “v” model
 
Using Vault eTMF Milestones and EDLs to Support Inspection Readiness
Using Vault eTMF Milestones and EDLs to Support Inspection ReadinessUsing Vault eTMF Milestones and EDLs to Support Inspection Readiness
Using Vault eTMF Milestones and EDLs to Support Inspection Readiness
 
Quality Management System Vendor Software System Use Benchmark March2014
Quality Management System Vendor Software System Use Benchmark March2014Quality Management System Vendor Software System Use Benchmark March2014
Quality Management System Vendor Software System Use Benchmark March2014
 
SolarWinds Application Performance End User Survey (Australia)
SolarWinds Application Performance End User Survey (Australia)SolarWinds Application Performance End User Survey (Australia)
SolarWinds Application Performance End User Survey (Australia)
 
Lexcomply - Compliance Management Solutions
Lexcomply - Compliance Management SolutionsLexcomply - Compliance Management Solutions
Lexcomply - Compliance Management Solutions
 
Benefits of Software Asset Management
Benefits of Software Asset ManagementBenefits of Software Asset Management
Benefits of Software Asset Management
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
 

Similar to How Technology Continues to Revolutionize Auditing

Next generation software testing trends
Next generation software testing trendsNext generation software testing trends
Next generation software testing trendsArun Kulkarni
 
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...CAST
 
Project quality management
Project quality management Project quality management
Project quality management MweeneMweemba1
 
Adopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliveryAdopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliverySOASTA
 
Data analytics software selection and implementation
Data analytics software selection and implementationData analytics software selection and implementation
Data analytics software selection and implementationJim Kaplan CIA CFE
 
AI in Quality Control: How to do visual inspection with AI
AI in Quality Control: How to do visual inspection with AIAI in Quality Control: How to do visual inspection with AI
AI in Quality Control: How to do visual inspection with AISkyl.ai
 
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...DAMA Ireland
 
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...Ken O'Connor
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkSplunk
 
Sdt strw verification white paper
Sdt strw verification white paperSdt strw verification white paper
Sdt strw verification white paperJamesWright
 
Qa focus 2015 2020
Qa focus 2015 2020Qa focus 2015 2020
Qa focus 2015 2020anuvip
 
Digital transformation testing.
Digital transformation testing. Digital transformation testing.
Digital transformation testing. Deepak Daniel
 
Advanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project DeliveryAdvanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project DeliveryMark Constable
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...SOASTA
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Jim Kaplan CIA CFE
 

Similar to How Technology Continues to Revolutionize Auditing (20)

Next generation software testing trends
Next generation software testing trendsNext generation software testing trends
Next generation software testing trends
 
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
 
Project quality management
Project quality management Project quality management
Project quality management
 
Adopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous DeliveryAdopting Cloud Testing for Continuous Delivery
Adopting Cloud Testing for Continuous Delivery
 
Data analytics software selection and implementation
Data analytics software selection and implementationData analytics software selection and implementation
Data analytics software selection and implementation
 
AI in Quality Control: How to do visual inspection with AI
AI in Quality Control: How to do visual inspection with AIAI in Quality Control: How to do visual inspection with AI
AI in Quality Control: How to do visual inspection with AI
 
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
 
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to Splunk
 
20160210 webinarslides
20160210 webinarslides20160210 webinarslides
20160210 webinarslides
 
Challenges of Executing AI
Challenges of Executing AIChallenges of Executing AI
Challenges of Executing AI
 
Sdt strw verification white paper
Sdt strw verification white paperSdt strw verification white paper
Sdt strw verification white paper
 
Qa focus 2015 2020
Qa focus 2015 2020Qa focus 2015 2020
Qa focus 2015 2020
 
Digital transformation testing.
Digital transformation testing. Digital transformation testing.
Digital transformation testing.
 
Advanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project DeliveryAdvanced Project Data Analytics for Improved Project Delivery
Advanced Project Data Analytics for Improved Project Delivery
 
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
Adopting Cloud Testing for Continuous Delivery, with the premier global provi...
 
IAASB & Disruptive Technologies
IAASB & Disruptive TechnologiesIAASB & Disruptive Technologies
IAASB & Disruptive Technologies
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques
 

More from Jim Kaplan CIA CFE

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsJim Kaplan CIA CFE
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) Jim Kaplan CIA CFE
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 

More from Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

How Technology Continues to Revolutionize Auditing

  • 1. 7/12/2013 1 HOW TECHNOLOGY CONTINUES TO REVOLUTIONIZE AUDITING: THE LATEST TOOLS AND THEIR IMPACT ON THE PROFESSION JIM KAPLAN CIA CFE PRESIDENT AND FOUNDER AUDITNET® AHIA 31st Annual Conference – August 26-29, 2012 – Philadelphia PA www.ahia.org 1 Agenda  Introduction  Historical Timeline Internet and Auditors  Technology’s Impact on Audit  Innovation in Audit Research  Evolution of Professional Networking  Latest Technology Tools for Auditors  Trends and the Future of Audit Technology
  • 2. 7/12/2013 2 Then and Now Auditors and Technology  Early Adopters  Innovators (into the new from Latin  Interested in new methods & techniques  Risk takers  Forward thinking  Gen X & Y  Laggards  Wait and see  Cautious  Hangs back  Last group to try or adopt a new product  Dislike change
  • 3. 7/12/2013 3 Evolution of Web for Audit Computers, Auditors and CAATTs  The Evolution of CAATTs 80’s  Around  Through  With  EDP/IT Auditors  Mainframe  Audit Software 90’s  Data extraction and analysis  IT and non IT Auditors  Windows  The Millenium  Software for all phases (planning, fieldwork, GRC)  Cloud computing
  • 4. 7/12/2013 4 Impact of Technology  Computers and networks provide most of the information needed for auditing  Auditors must use the computer as an auditing tool  Auditors must also use the computer for audit administration Impact of New Technology on the Profession  Professional Standards  16 Global Technology Audit Guides have been released since January 2009
  • 5. 7/12/2013 5 New Technologies and their Impact  Mobile computing  The Cloud or Internet based services  SaaS (application based)  PaaS (end to end SDLC)  IaaS (servers, storage, network) Social Media  Social Media Defined  The good the bad and the ugly  What is the primary risk?
  • 6. 7/12/2013 6 Technology as an Enabler There is a wide array of specialized tools to support and enhance the entire spectrum of internal audit processes … for the most part (auditors) are not taking advantage of them Not surprisingly, survey participants predict that technology will affect internal audit roles and responsibilities more than any other business trend. PwC 2010 Study on the State of the internal audit profession Audit Software
  • 7. 7/12/2013 7 Categories of Audit Software Technology Automated Issues Tracking Electronic Work Papers Risk Assessment Continuous Controls Monitoring Anti Fraud Software GRC Audit Management Software Audit Resource Scheduling Data Analytics Data Analysis for Auditors Although internal auditors have been doing data analysis for more than 25 years, it has only recently started to become standard practice. By our nature, most accountants and auditors are inclined to stick with what has worked in the past, rather than reach outside our comfort zone for an alternative that could help us accomplish more. Do you reach outside your comfort zone?
  • 8. 7/12/2013 8 Obstacles to Implementation  Lack of an audit methodology  Skill set gap  Department size  Cost implication  Complexity of the software  Resistance in training auditors  Failure of software to meet audit departments needs  Failure to plan for use Heard on the Street Technology Initiatives considered having the most impact (2012 AICPA Top Technology Issues) 1.Information security 2.Remote access 3.Control and use of mobile devices 4.Business process improvement with technology 5.Data retention policies and structure 6.Privacy policies and compliance 7.Staff and management training 8.Spreadsheet management 9.Overall data proliferation and control 10.Portals (vendor and client/customer)
  • 9. 7/12/2013 9 New Tools for Auditors New Tools  Sept, 2008….  Any device, Any time, Any where was born  Users not interested in security, they want to trust, not to be trusted  Any unprotected device connected to both the Internet & and company LAN poses a security risk
  • 10. 7/12/2013 10 Other Technology Tools for Auditors  Open Source Audit Software  Continuous Controls Monitoring  Regulatory Compliance  Business Intelligence Software Audit Apps for iPhones/iPads
  • 11. 7/12/2013 11 Imagine the Possibilities  Access your computer from remote locations  Collaborate using tools from the road  Access audit programs, work papers and more from your mobile device  Join Webinars and Webcasts for training  Conduct or participate in virtual meetings with staff, clients etc. Trends and their Impact  Mobile devices and wireless computing  Smart devices and malware  Cloud sourcing and computing – security, governance and compliance  Social media platform for communications  Continuous risk and control assessment  Reporting to the Board using SOTA technology
  • 12. 7/12/2013 12 Skill Set for Future Auditors  Multi-disciplinary less accountants more business oriented  Critical thinking skills  Strong communication skills  Audit Technology oriented The Impact of Technology Observations Not surprisingly, survey participants predict that technology will affect internal audit roles and responsibilities more than any other business trend. High-performing internal audit functions maximize the use of technology to enhance the efficiency, effectiveness, and quality of operations. PwC 2012 Study on the State of the internal audit profession
  • 13. 7/12/2013 13 AuditNet® Survey - 2012 State of Technology Use by Auditors Profile of Over 1,500 Responses • 45% 5 or less auditors • Technology tools used – mostly data analytics and EWP • Technology tools least used – monitoring (continuous audit and fraud), GRC, risk compliance • Only 17% feel that their auditors are technology proficient • Technology training primarily OJT • 35% maintain an inventory of audit technology tools • More than half (54%) rated their department at the informal use level (ad hoc or none at all) for audit technology • Less than 4% rated their department at the highest maturity level AuditNet® 10 Point Action Plan for Integrating Technology in Audit 1. Conduct an inventory of audit technology tools 2. Provide training for all staff in use of audit technology 3. Measure staff technology KSA 4. Build a business case for audit technology 5. Work with IT and Senior Management on cost 6. Hire auditors with technology skills 7. Find a technology champion and influencer 8. Establish an audit technology assessment benchmark and update annually 9. Require the use of technology for all audit and administrative tasks 10. Develop a succession plan so that audit software does not become shelfware
  • 14. 7/12/2013 14 AHIA Improvement Needs Top 5 27  Continuous Audit  IT Audit Performance  Data Analytics  Enterprise Risk Management  Clinical Processes Future Predictions  Standards will mandate use of technology tools for audit  New generation of auditors must have the KSA to utilize technology  If auditors and audit departments do not adapt to new technology they risk outsourcing  Social networking will evolve to professional networking  Tools will become more intuitive  Knowledge hubs for audit tool, techniques and resources will consolidate and merge
  • 15. 7/12/2013 15 Audit Programs in the Queue AuditNet®  Auditor’s Guide to Cloud Computing - Security Considerations.xls  Cloud Matrix_Benefits & Risks.xls  AuditNet® Guide to Social Networking  AuditNet® Guide to Wireless Security  Business Continuity Planning – A Diagnostic Tool  Forensic Document Examination  Guidelines for Validation Testing  Data Analytics Enabled Audit Programs for Key Business Processes  AuditNet® is working to provide tools and resources to keep pace with new technology! Conclusion  I hope that I have provided you with some useful information that will stimulate your thought processes!  Any questions?
  • 16. 7/12/2013 16 Contact Information Jim Kaplan CIA, CFE editor@auditnet.org http://www.auditnet.org